Added wiki

This commit is contained in:
Jieyab89
2024-09-07 17:33:20 +07:00
parent 4fd1263fb9
commit a19076a7da
19 changed files with 18 additions and 792 deletions

View File

@@ -1,70 +0,0 @@
# What is HLR?
The Home Location Register (HLR) is a database that contains data related to customers authorized to use the Global System for Mobile Communications (GSM) network.
Some of the information stored in the HLR includes the International Mobile Subscriber Identity (IMSI) and the International Mobile Subscriber Directory Number (MSISDN) of each subscription.
So HLR in a nutshell
HLR is a mobile network information database. HLR is an integral component of GSM, CDMA, and TDMA networks. This method is not a method for tracking location, but rather the area where a cellphone number comes from based on a unique code set by each cellular operator.
Is that accurate?
HLR will never be accurate. HLR will only show the location of the city where the number was issued or registered, not the location where we are now
# What is IMSI?
The IMSI uniquely identifies each Subscriber Identity Module (SIM) and serves as the primary key for each record in the HLR
# What is MSISDN
MSISDN (also known as Mobile Station International Subscriber Directory Number) is a list of telephone numbers for each subscription
# So what HLR for?
1. HLR is updated whenever the SIM is transferred to another location area.
2. HLR also plays a crucial role in the delivery of Short Message Service (SMS) messages.
3. Before an SMS company forwards a message to the intended recipient, it scans through the HLR to find the recently used Mobile Switching Center (MSC).
4. If the target MSC reports that the recipient's phone is unavailable, a message waiting flag is set in the HLR.
5. If the recipient appears in another MSC (for example, when traveling to another city), they still receive the message because the MSC notifies the HLR once the recipient is detected within its jurisdiction.
6. Other mobile components actively working with the HLR include the Gateway Mobile Switching Center (G-MSC), Visitor Location Register (VLR), and Authentication Center (AUC).
# What is BTS?
A base transceiver station (BTS) or a baseband unit[1] (BBU) is a piece of equipment that facilitates wireless communication between user equipment (UE) and a network. UEs are devices like mobile phones (handsets), WLL phones, computers with wireless Internet connectivity, or antennas mounted on buildings or telecommunication towers. The network can be that of any of the wireless communication technologies like GSM, CDMA, wireless local loop, Wi-Fi, WiMAX or other wide area network (WAN) technology.
BTS is also referred to as the node B (in 3G networks) or, simply, the base station (BS). For discussion of the LTE standard the abbreviation eNB for evolved node B is widely used, and GNodeB for 5G.
Though the term BTS can be applicable to any of the wireless communication standards, it is generally associated with mobile communication technologies like GSM and CDMA. In this regard, a BTS forms part of the base station subsystem (BSS) developments for system management. It may also have equipment for encrypting and decrypting communications, spectrum filtering tools (band pass filters) and so on. Antennas may also be considered as components of BTS in general sense as they facilitate the functioning of BTS. Typically a BTS will have several transceivers (TRXs) which allow it to serve several different frequencies and different sectors of the cell (in the case of sectorised base stations). A BTS is controlled by a parent base station controller via the base station control function (BCF). The BCF is implemented as a discrete unit or even incorporated in a TRX in compact base stations. The BCF provides an operations and maintenance (O&M) connection to the network management system (NMS), and manages operational states of each TRX, as well as software handling and alarm collection. The basic structure and functions of the BTS remains the same regardless of the wireless technologies.
# What is Triangulation
Curiulation in Cell Phone Tracking:
Triangulation is a mathematical technique used to determine the location of an object using information from at least three known reference points. In the context of cell phone tracking, triangulation involves using data from multiple sources, such as cellular signals, GPS, and Wi-Fi, to determine a cell phone's location with fairly high accuracy. Not just anyone can do it because it requires sensitive data such as IMEI, LAC, CID, etc. which are only accepted by the provider/network provider. However, it can still be used by the police because they are the authorities.
Triangulation is so named because conceptually it looks like forming a triangle using three BTS towers that are simultaneously connected to our cellphone.
Each BTS tower is divided into three sectors, which we can call the Alpha, Beta and Gamma sectors (α, ß, Y). Each sector is used to measure the distance from the user's location to the BTS tower.
# Notes
>
>I will make changes to the article here and review it and add case study examples
>
# Keyword tips
VLR, IMSI, MSISDN, MRSN, Signaling, Teclo, VOIP, GSM, MCC, MSIN, SS7, HLR, VOIP, AOL Signal Int (SIGINT)
# Reffernce
- [Forum Seccodeid Trace Cell Phone Num](https://forum.seccodeid.com/d/mencari-dan-melacak-nomor-hp-dengan-teknik-osint)
- [What is BTS](https://en.wikipedia.org/wiki/Base_transceiver_station)
- [cell phone triangulation](https://www.linkedin.com/pulse/cell-phone-triangulation-boney-maundu/)
- [Triangulation Cell Work TegalSec Blog](https://blog.tegalsec.org/methode-melacak-ponsel-triangulating-with-bts-for-swift-recovery/)
- [Rifky the Cyber CH](https://www.youtube.com/@RifkyTheCyber)

View File

@@ -0,0 +1,7 @@
# Title
Your name [hyperlink](link)
## Section 2
# Reffernce

View File

@@ -1,48 +0,0 @@
# Detect Fake Facebook Profiles
- Check the join date
Make sure the joining date is old and has related posts like the first post and look at the relative posts, make sure they are recent
- There are no posts or photos and other content
First, look at the detailed account information. If the average number of posts is few and most of them are private or only friends, try to interact with the target by profiling the account
- Persons age does not accord with the profile content
Look at posts and photos and what is shared there according to age
- There are no friends who have the same surname
There is no list of friendships such as close friends, family related to the target or things the target is interested in
- Friend lists whose profiles are fake
Check the friend list, whether the account has the same indicators or patterns as the points explained here. You can see and investigate your friendship list from photos, posts and look for other sources, whether from purchased or fake accounts
- Use of stock image for profiles
You can do a reverse image search to determine where the photo came from. If you find this photo circulating a lot on the internet and a little information on the internet, you can be sure that it is fake or generated by AI or editing skill
- Profile picture do not show face or clear image
There are no related facial photos and the photos in the album are not clear, such as blurry, depicting logos or cartoon photos and other things
- Friend lists are different culture, location and language
- Too few friends or to many friend list
The account is still quiet or has too many friends. It is possible that a new account was created or the account has been created several times for a specific purpose and is not consistent with the bio and profile linked to the friends list. Try to chat or interact with your friends list, if there is no response and the chat is like a robot reply, you don't follow the fanpage then it's definitely fake
- Profile name is different to the profile name as in the url
- The like post, photo are on single topic
- Bio inconistencies
Reff:
- https://www.bellingcat.com/resources/2021/11/01/a-beginners-guide-to-social-media-verification/
- https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607
- https://www.bellingcat.com/resources/2021/11/09/first-steps-to-getting-started-in-open-source-research/?utm_campaign=Digital%20Investigations&utm_medium=email&utm_source=Revue%20newsletter

View File

@@ -1,35 +0,0 @@
# How To Find Geolocation (Geospatial)
Finding geolocation is not easy, there are obstacles when you want to find a location for example, limited resources, unclear data and the information you find is not valid. Here the detail
1. The data you get is poor such as image quality, audio, etc.
2. Lack of information and lack of valid information
3. Lack of data sources such as satellite images, places that are rarely touched by satellites or services about satellites or GIS (Geographic Information Systems)
4. Conflict areas, remote and secret areas that are rarely discussed by the public or visited by the public
5. Your source of information is not real time, you need a lot of real time information and data to facilitate analysis.
6. The large number of identical regions or areas and geographic information in a region (You need to understand each region in terms of geography, houses, settlements etc)
7. Sources of data obtained at night or in the shadows (dim places)
# How To Find Geolocation?
1. Reverse image, always use it such as Google Lens, Bing, Yandex and other things
2. Knowing the image or media (IMINT) Understand the objects in the media. Is there a place name? People? Faces? And anything else you can use that clue?
3. Exif or metadata, check the metadata on each file
4. Improve the quality of your data such as using AI to clarify objects, editing skills and other things that help clarify objects
5. Learn Geography
6. Use satellite imagery and street view
7. Use animation or 3D building to make it easier to find the POV of an object
8. Leverage sun position and shadows
9. Use OpenStreetMap for data mining (OSM Query or Overpass Query)
10. Trying search historical image or satellite (wayback)
11. Trying check nearby about the location (If you has found the location such as building, street name and etc)
12. Find out about the place or region you want to know such as seasons, timezone, buildings, people (faces), language and other things
13. Creating 3D simulation modeling such as AutoCAD and other platforms, this is useful for analyzing and playing with imagination to determine problems with the object
14. Using AI & ML requires programming or coding skills, you can collect assets or datasets such as the geography of a country, faces, buildings and so on so that you can match the similarity of the image if it is not in Google, Bing or other data brokers
15. Use Google Earth Pro airplane mode to see the characteristics of the world, this tends to be difficult and takes a long time
Reff:
- https://www.youtube.com/watch?v=509wv0cohgA
- https://kit.exposingtheinvisible.org/en/geolocation.html
- https://www.bellingcat.com/resources/how-tos/2014/07/09/a-beginners-guide-to-geolocation/

View File

@@ -1,51 +0,0 @@
# How To Make Collection
- Passive Collection
Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform
PRO
1. Low risk being detected
2. From third party or platform
3. Does not require physical contact or interaction with the target
CONS
1. Little and too much information
2. Requires quite long and detailed validation
3. Data not realtime
- Active Collection
Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering, human intercation and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked
PRO
1. Real time data
2. Acurated data
3. The data can be guaranteed to be legit and comes from the original source
4. Minimum for data validation
CONS
1. Requires interaction with the target
2. There is a high risk of being detected by related parties or target
3. Requires adequate skills
- Aditional Information
Why ML, Big Data and AI need? For example for threat intelligence and data mapping
> Structuring data into ontologies and events
>
> Classifying events and entities, helping human analysts prioritize alerts
>
> Forecasting events and entity properties through predictive models
>
> They were able to make more informed decisions faster
>
> The information they accessed became more relevant and actionable
>
> Their existing security solutions were improved
>

View File

@@ -1,13 +0,0 @@
# Image and Video Analysis
Images and videos can provide crucial evidence. Heres how to analyze them:
1. Metadata, extract metadata to get information about when and where an image or video was taken
2. Reverse Image Search, use reverse image search to find the source and other instances of the image online
3. Frame Analysis, analyze video frames to identify objects, locations, and people
4. Image forensics, doing forensics on images, looking at detailed information such as changing exposure and looking at other related details in the image
5. Understand the objects in the picture or video, for example a person's body posture, face, building, terrain and other things
6. Measure and identify the time, you can do MASINT to analyze estimates of when it was taken as well as weather conditions and the azimuth position of the sun and where the location is
7. Creating 3D simulation modeling such as AutoCAD and other platforms, this is useful for analyzing and playing with imagination to determine problems with the object
8. Using AI & ML requires programming or coding skills, you can collect assets or datasets such as the geography of a country, faces, buildings and so on so that you can match the similarity of the image if it is not in Google, Bing or other data brokers
9. Check the steganography it is possible that you will find something in the file like hidden data or something else.

View File

@@ -1,58 +0,0 @@
# OSINT Category (Intelligence Base)
1. OSINT
Open Source Intelligence. In point one, OSINT search and Collection of information through open sources or the public internet. In contrast to intelligence obtained through secret methods or hidden, OSINT utilizes information available to general.
2. MASINT
Signature Measurement and Intelligence focuses on collection and analysis of data from various forms of temperature measurements and changes or climate. In contrast to intelligence which is based on visual reconnaissance or communications, MASINT relies on technology to detect and analyzing signals that cannot be detected directly by human senses.
3. GEOINT
Geospatial Intelligence focuses on geographic or system analysis geographic information (GIS) to collect and analyze geography or satellite imagery. Usually used for military or Speakers for analyzing information from satellite images, information a region and place
4. IMINT
Image Intelligence focuses on analyzing images or footage media such as videos or photos, visual analysis from various sources examples of satellite images, airplanes, building structures and cities. In process
This an analyst will extract information from an image, for example in a mountainous area identifying the height of a plains, terrain and determining coordinates
5. DARKINT
Darkweb Intelligence focuses on the darkweb. Collection information and digital traces contained in darkwb (Dark Site) Usually used to track cyber threat actors, buying and selling illegal, human trafficking and monitoring crimes on the internet
6. SOCMINT
Social Media Intelligence focuses on gathering information through social media platforms such as Facebook, Instagram, Twitter and others. This collection of information can be used to view activity as well as monitoring on social media, the information collected various things such as usernames, posts, trending, dates and other things which can be used to track information
7. SIGINT
Signals intelligence is intelligence derived from signals and electronic systems used by foreign targets, such as communications systems, radars, and weapons systems to determine the capabilities, actions, and intentions of foreign enemies
8. ELINT
Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type
9. HUMINT
Human Intelligence focuses collecting information or intelligence from humans and provided by human resources. For example interrogations and conversations, interviews, surveys, espionage with people who have access to information. Surveillance of targets, uncovering people with potential access to information, approaches to targets
10. OPSEC (Operational security)
Operational Security is a risk management and security process and strategy used to classify and protect sensitive information and prevent it from falling into unauthorized hands or people. In implementing OPSEC, information will be classified and steps will be taken to identify potential threats and vulnerabilities that may occur in that sensitive information. The approach involves analyzing an organization's systems and operations from the perspective of those who could potentially attack and retrieve sensitive information. Several applications in practice such as monitoring behavior, social media, and implementing best security practices will reduce the risk of exposure of sensitive information.
11. FISINT
Foreign instrumentation signals intelligence involves collecting information from foreign nationals who are testing or using aerospace, surface, or sub-surface systems. Foreign instrumentation signals intelligence involves the collection of information from foreign nationals who are testing or using aerospace, surface, or subsurface systems, related to the testing and operational deployment of foreign aerospace, surface, and subsurface systems. FISINT is not in ordinary human language, but in machine-to-machine (instrumentation) language or in a combination of ordinary human language and instrumentation language. FISINT is also considered a subset of MASINT (intelligence measurement and signature)
12. COMINT
Communications intelligence focuses information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls, and online interactions on the analysis of signals containing speech or text. Tapping voice, text or signal channels is aimed at finding information about voice, text and signal transmissions. That can lead to determining a number of intelligence considerations about the communications, such as signal bandwidth and protocol, modulation type and rate, and the radio frequency used
13. CSINT
CSINT is Cyber Security Intelligence In the world of intelligence, CSINT refers to and analysis related to cyber security which is used to protect computer systems, networks and data from threat information and cyber attacks. CSINT can also involve the use of classified information sources, such as intercepted communications or data from surveillance systems, typically used by authorized investigators. Examples include specialist analytical and forensic tools, secret geolocation service, A collection of confidential data provided by law enforcement agencies, subscription and special tools
14. Espionage
Espionage is the illegal or unauthorized collection of confidential or sensitive information. Espionage is usually carried out to obtain data of strategic or tactical value, such as military, technical, business or political information. These activities often include infiltrating organizations, monitoring their activities, or using obfuscation techniques to access protected information

View File

@@ -1,86 +0,0 @@
# What is OPSEC (Operational security)?
OPSEC stands for Operational Security and is a term derived from the United States Military. Since its introduction, OPSEC has been adopted by many organizations and sectors to safeguard sensitive information in various contexts beyond the military. The objective of OPSEC is to prevent sensitive information from getting into the hands of an adversary, primarily by denying access to the data. First, we want to identify the data that can be compromised and then take steps to reduce the exploitation of this data and minimize the risk.
# How to Threat Model for OPSEC
OPSEC is not a static concept. Depending on the types of activities you are conducting, you will need to adapt your OPSEC measures. In order to evaluate your activities, their risk, and the necessary measures to be implemented, we need to conduct threat modelling. This allows us to determine the degree of security which we want to achieve. This threat modelling can be done in a fairly informal manner, merely by taking the time to write down the basic information pertaining to the following points:
- Know your target. A project investigating Threat Actors or organized crime groups, or malware and its developer, has a different level of OPSEC requirements from a project looking into the social media profile of a 16-year-old forum troll.
- Identify potential threats. Possible threats to sensitive data need to be identified and potentially documented. Consider that threats may exist externally through third parties, as well as internally. Data theft or breaches (either accidental or deliberate) can publish a wealth of data about you personally without your knowledge.
- Analyze security vulnerabilities. You must perform an objective analysis of your current security measure implementation strategy. Look for potential weaknesses which can be exploited. This covers all types of vulnerabilities, from cross-usage of devices to digital foot printing, usage of specific monitoring/tracking tools, etc.
- Determine the risk level of each vulnerability. Consider the damage that could be caused should your data be compromised, or if the organization may suffer as a result of your laxity.
It is recommended that, having gathered the information relating to the points, you speak to the relevant individuals who can help you with evaluating whether you belong to the group needing to implement Level 1 OPSEC measures, or Level 2. This may be the Chief Technical Officer (CTO) and/or Information Security Officer (ISO); all organizations are different but should have someone who is an authority and who can help guide your assessment.
# What is the OPSEC process?
OPSEC is an analytical process that entails assessing potential threats, vulnerabilities, and risks to sensitive information.
The five-step OPSEC process:
- Identify sensitive data - understand what your sensitive information might be.
- Threat Assessment - identify potential cybersecurity threats, i.e., think of what adversaries could exploit about you.
- Vulnerability analysis - identify where you are vulnerable and/or weaknesses in security.
- Risk assessment - measure the level of risk to do with each previously identified vulnerability.
- Apply countermeasures - develop countermeasures to minimize the identified risks.
- Everyone's OPSEC will look different depending on what they are doing, who they are, and what types of activities they are engaged in. You can ask yourself some questions to understand this in a better way and to identify your current threat model: What information do you want to protect? i.e., House address, work location, family members, and assets.
What can an adversary gain from looking at your online footprint? Who might want to gain access to that information? This can be in the form of people you don't know who are looking for a soft target online or in the form of you applying for a job and the recruiter finding you on social media to see what you post about to get an idea about your character.
Where do you expose yourself too much? Do you have privacy settings on all your social media? What do you post online? These questions may assist with making your assessment.
# Why is OPSEC important?
We all have something to keep from the general public, and if we didn't, we wouldn't password-protect our devices, lock our front doors, or sign out of our emails. Your online footprint says a lot about you, some of what you might not want to be accessible to just about anyone.
# Why is OPSEC important to OSINT investigators?
OSINT investigators are required to have good OPSEC. This means they should avoid using their personal social media accounts to conduct investigations. The reason for this is to uphold their privacy and security and ensure the investigation's integrity. Research accounts are created to isolate OSINT research, ensuring a separation between the personal and work lives of OSINT investigators. It is essential to emphasize the importance of separating an OSINT investigator's real identity from research accounts.
Read more about Sock Puppets here:https://www.sans.org/blog/what-are-sock-puppets-in-osint.
Those conducting OSINT investigations can make OPSEC mistakes, including:
- Network attribution (visiting the target's website without altering their footprint)
- Using personal accounts and devices for OSINT investigation research
- Accidentally interacting with a target (liking, commenting, friending them on social profiles)
- Those of you who are not conducting OSINT research can also make OPSEC mistakes, including the general oversharing of personal information online, and one example of poor OPSEC is leaving unused social media profiles online (especially when they contain old photos and other information you have posted in the past). The general rule to understand is that we might make mistakes, and the objective should always be to reduce the impact of these mistakes.
# Best Practices for Good OPSEC
### Basics for everyone:
- Use strong and unique passwords. Do not create passwords based on your pet's name, kids, spouse, etc.
- Use a password manager or use a password notebook
- Turn on two-factor authentication on your email/social accounts.
- Install the latest software & app updates to all your devices
- Activate screen-lock when idle
- Don't leave your device unattended
- Use webcam covers and privacy filters
- Use encrypted email services such as Proton Mail
- Use encrypted cloud storage like Proton Drive
- Adjust privacy settings on social media platforms
- Use a secure search engine like search.brave.com or startpage.com
- If you use public Wifi at coffee shops, hotels, or airports, use a Virtual Private Network (VPN)
- Check the permissions apps ask for before downloading
- Educate yourself and your family/friends about online privacy and security
### Additional tips for the OSINT investigator:
- Avoid using your personal devices and social media profiles to conduct OSINT Investigations. Use sock puppets (research accounts).
- Use dedicated devices and accounts for investigations to avoid cross-contamination and compromising an investigation.
- Use a paid Virtual Private Network (VPN) to mask your IP address. Website owners can view who and what IPS visit their site. Expect that a target is looking at who views their personal website. This does not apply to social media research, as only the social media company would see the IP address.
- Use a Virtual Machine (VM) to sandbox your OSINT research, and make sure a VM is used as an operating system with your computer's operating system. If you click on malware, your device will not be impacted.
- Think of your device fingerprint (network computer's IP address when visiting a target's website). You want to make attribution to you difficult. This means taking steps to mask our personal identifiable information (PII).
- Consider the time/days you conduct research (9-5?) - adjust settings to match the target's time zone.
- Vet the OSINT open-source tools you use.
- Have Standard Operating Procedures (SOPs) about how you will conduct online research.
- Avoid posting your security clearance on social media.
- It is important to note that OPSEC is an ongoing process that requires continuous evaluation, adaptation, and improvement to address evolving threats and vulnerabilities. For instance, you may move into a job where you need to reassess your threat model. This is why it's crucial to think about this often and reassess as necessary. It is not a one-time activity but rather a mindset and a set of practices that should be integrated into daily operations.
- ### Reference
- [SANS.org OPSEC](https://www.sans.org/blog/what-is-opsec/)
- [Maltego](https://www.maltego.com/blog/everything-you-need-to-know-about-operational-security-opsec/)
- [Skopenow](https://www.skopenow.com/resource-center/opsec-tradecraft-for-osint)

View File

@@ -1,19 +0,0 @@
# OSINT Tips Analysis
There are still many steps you can do, I can't mention them all, this is a brief scenario that I often do
- Collection
This stage the researcher will collect information which are on social media profiles, media images, videos, sounds, education and other things
- Processing
Researchers will analyze and validate from data example the images in the post and view the metadata and data that has been collected
- Exploitation
At this stage the researcher will carry out sample analysis using Google Maps to do geoint and get pin points from the image. Exploitation also sometimes referred to as analysis e.g with social engineering and other things
- Production
Production, in this stage researcher will make a report containing what data researchers can start from the collection, processing and exploitation (analysis) stages and data that has been validated and mature

View File

@@ -1,52 +0,0 @@
# OSINT for Journalism
Open Source Intelligence (OSINT) is a technique of gathering information from publicly available sources and is used for various purposes, including journalism. For a journalist, OSINT can be a very useful tool to gather accurate and relevant data.
1. News and Social Media Sources
- Online News Monitor trusted news sites and alternative news platforms for the latest information and context.
- Social Media Use platforms like Twitter, Facebook, Instagram and LinkedIn to find up-to-date information, public views and direct sources.
2. Government and Institutional Websites
- Official Government Sites Access public data, annual reports and statistics from government websites.
- Reports and Publications Search for reports from research institutes, international organizations, and non-governmental organizations (NGOs).
3. Verification and Validation
- Reverse Image Search Use tools like Google Images or TinEye to verify the authenticity of images and find the original source.
- Cross-Referencing Verify information by comparing multiple independent sources to ensure accuracy.
- Check Sources Cross-reference information from multiple reputable sources to confirm its validity.
- Authenticate Media Use reverse image search and metadata analysis to verify the origin and context of images and videos.
- Fact-Check Statements Compare statements and claims against publicly available records and data.
4. Monitoring and Alerts
- Google Alerts Set alerts for specific search terms to get notified about the latest news or articles.
- RSS Feeds Follow the news feed to keep up to date with the latest news.
5. Context
Providing context is crucial for any investigative story. OSINT allows journalists to gather comprehensive background information that enriches the narrative:
- Historical Data Access archives and historical records to understand the background and evolution of a story.
- Geographical Information Use mapping tools to visualize locations and spatial relationships.
- Social Context Analyze social media trends and public sentiment to gauge the broader impact of the story.
6. SOCMINT
Social media platforms are gold mines for OSINT. Heres how to tap into them:
- Profiles and Posts Analyze profiles, posts, comments, and interactions.
- Hashtags and Keywords Track relevant hashtags and keywords.
- Geotagging Utilize geotagged posts to gather location-specific information.
- Archived Data Use tools like the Wayback Machine to access deleted or altered content.
# Tools
1. Search Engines: Google, Bing, DuckDuckGo
2. Social Media Analysis: TweetDeck, Crowdtangle, Social Bearing
3. Image Verification: Google Reverse Image Search, TinEye
4. Public Records: Pipl, Spokeo, LexisNexis
5. Mapping and Geolocation: Google Earth, OpenStreetMap, Geofeedia
6. Check on readme Jieyab repo
Reff
- https://osintteam.blog/osint-for-investigative-journalism-49cca089862c

View File

@@ -1,37 +0,0 @@
# OSINT for Academic & Sciene
OSINT (Open Source Intelligence) is a method of collecting and analyzing information from open and publicly accessible sources. In an academic context, OSINT is used to investigate, verify, and collect data needed for research or study.
# The Use Case of OSINT in Academia
1. Literature Research. OSINT allows researchers to collect data from journals, books, articles, and other publications relevant to their research topic. This helps in evaluating previous findings and building a strong theoretical basis.
2. Statistical Data Collection. Researchers can use open sources to access statistical data that has been published by government agencies, international organizations, or research institutions. This is essential for quantitative analysis and interpretation of results.
3. Verification of Facts. In the academic writing process, OSINT is used to verify the veracity of facts and claims in the literature or put forward by third parties. This includes cross-checking information with various sources.
4. Trend and Development Analysis. By monitoring the latest publications, news, and data from various sources, researchers can identify the latest trends and developments in their field of study.
5. Case Research. In case studies, OSINT allows researchers to gather information relating to a specific case from publicly available sources, such as media reports, legal documents, and public records.
6. Historical Document Collection. Sources: Digital archives, online libraries, and openly available historical document collections.
# Example Case
1. Study Literature:
Example: A researcher in sociology who is studying the impact of social media on social behavior can use OSINT to collect journal articles from open academic databases, such as Google Scholar or PubMed. They can also access publications from conferences, e-books, and research reports from universities.
2. Statistical Data Collection:
Example: In economic research, researchers can use statistical data published by institutions such as the World Bank, IMF, or national statistical agencies. Open sources such as data.gov provide various datasets that can be used for economic analysis.
# OSINT Tools and Platforms for Academia
1. Google Scholar: For searching journal articles and academic publications.
2. PubMed: For medical and biomedical research.
3. JSTOR: For access to academic journals and books.
4. Data.gov: For government statistics and datasets.
5. OpenStreetMap: For map data and spatial analysis.
6. Social Media Platforms: For monitoring trends and opinions on social media.
7. [More OSINT Historical](https://github.com/Jieyab89/OSINT-Cheat-sheet#osint-historical)

View File

@@ -1,67 +0,0 @@
# OSINT for War Analysis
Analyzing warfare or conflict is not an easy thing, there are many challenges that investigators must do in analyzing warfare. As we know OSINT is not as easy and simple as you imagine, tough challenges such as the amount of information, miss information, propaganda and other things
Finding geolocation is also not an easy too, as well as finding information that relates to events or events, researchers are required to be observant in analyzing geolocation, especially at night or lack of information on objects or events to be analyzed such as
1. Problems with satellite analysis limited information and lack of recent data
2. Lack of information
3. Event was taken at night
4. Lack of graphic quality in pictures or videos
5. There are manipulations in the video such as editing, cutting video, audio and other things
6. Lack of GIS information in the conflict area
7. Propaganda and hoax content and miss information
# The Challenge
1. Propaganda and hoax content and miss information
2. Knowing the background of the conflict problem
3. Understand the geography, social characteristics and conflict-affected areas
4. Widening conflict information
5. Understand astronomy and measurement science (MASINT)
6. Takes a long time
7. Mental
# Tips and Trick
1. Understand your mental and physical health
2. Determine your convenient time, I personally like at night like noctrunal animals like bats, owls
3. Understand the area, climate, building structure, social, problems in the conflict area first
4. Archive and record your discovered sources
5. Use the 3d buliding app (it's already available in this repo)
6. Take measurements and verify the time when it was taken
7. Use satellite remote sensing like Nasa firms, EO browser, etc
8. Take reliable sources such as credebitlas sites, posts, and other things that have evidence, theoretical foundations and scientific results
9. Critical thinking. Especially about big, inflammatory claims. When big news breaks, we see a lot of recycled footage posted on social media. Recycled footage is footage from another conflict or time period that is publicized as if it were from a current event. Often details in the footage such as signage or other details in the surroundings can provide clues as to the actual time or place the video was taken
10. Beware of manipulation and AI generation, When all the footage or photos related to an event go viral, you often see accounts popping up that spread manipulated or completely fake images. Free and easily accessible AI-powered image creation tools have now made this type of content faster to create and more common
11. Beware of state actors, who Sometimes Share Fabricated or Unreliable Footage In times of conflict, it is not unusual for state actors to imply bad faith on the part of their adversaries. In some cases, doctored videos appear online
12. Protect your mental health watching footage from war zones can cause trauma. Be careful when watching unknown footage. There is almost always a lot of highly disturbing content circulating during times of conflict
13. Racing to be first at all costs it's easy to get caught up in the maelstrom of breaking news, especially around terror attacks and military conflicts. The incentives of social media platforms, where most public open-source research is conducted, encourage this behavior. There is a great temptation to be the first to make a 'breakthrough' in a developing story, or to quickly create an analysis of an event. However, validating content should always take precedence over speed
# Satellite Imagery
Satellites are one of the most useful resources in an open-source investigator's toolkit. However, eye-in-the-sky imagery can be used for more than just mapping and geolocation. Some satellites also carry instruments with sensors that detect heat - and the data they generate can be used to monitor war zones. NASA's Fire Information System for Resource Management, or FIRMS, is a tool that detects active fires and thermal anomalies
Satellite images that can detect climate change and fires are commonly referred to as remote sensing satellites. Some satellites that are often used for this purpose include:
1. Landsat satellites: Uses sensors such as the Landsat 8 Operational Land Imager (OLI) that help monitor changes in land use, vegetation and fires.
2. MODIS (Moderate Resolution Imaging Spectroradiometer) satellites: Attached to the Terra and Aqua satellites, MODIS provides data on surface temperature, humidity and fire.
3. Suomi NPP Satellite: Uses instruments like VIIRS (Visible Infrared Imaging Radiometer Suite) to detect fires and monitor climate change.
4. Sentinel-2 satellite: Part of the Copernicus program, providing high-resolution imagery to monitor changes in land use, vegetation and fires.
5. GOES satellites (Geostationary Operational Environmental Satellites): Monitor weather in real-time, including major fires and climate-related weather changes.
You can read the documentation to understand the source of the imagery, basically the imagery will provide you with information, make sure you know how to measure, set up, search for satellite data to facilitate your investigation
These satellites provide very useful data for climate analysis, wildfire monitoring and other environmental studies.
Reff
- https://www.bellingcat.com/resources/2024/04/25/oshit-seven-deadly-sins-of-bad-open-source-research/
- https://www.bellingcat.com/resources/how-tos/2023/10/26/separating-fact-from-fiction-on-social-media-in-times-of-conflict/
- https://oballinger.github.io/PWTT/
- https://www.bellingcat.com/resources/2024/05/17/how-to-use-free-satellite-imagery-to-monitor-the-expansion-of-west-bank-settlements/
- https://www.bellingcat.com/resources/2022/10/04/scorched-earth-using-nasa-fire-data-to-monitor-war-zones/

View File

@@ -1,34 +0,0 @@
# OSINT Risk and General
# Common OSINT Sources
- Social Media Profiles: Platforms like Facebook, Twitter, LinkedIn, and Instagram.
- Public Records and Databases: Government databases, court records, and other publicly accessible documents.
- News Articles: Online news sites, blogs, and other media outlets.
- Company Websites: Official websites, press releases, and public disclosures.
- Forums and Blogs: Online communities and personal blogs where information is freely shared.
# The Risks of OSINT
OSINT can be leveraged for various malicious purposes, including:
- Identity Theft: Using gathered information to impersonate individuals.
- Social Engineering Attacks: Manipulating people into divulging confidential information.
- Corporate Espionage: Stealing corporate secrets or competitive intelligence.
- Stalking and Harassment: Tracking and harassing individuals using collected data.
# Securing Social Media Profiles
1. Facebook
Privacy Settings: Adjust privacy settings to control who can see your posts and personal information. Set your profile to be visible only to friends, and limit the audience to old posts.
Limit Public Information: Your profile should not include your full address, phone number, or other sensitive information.
2. LinkedIn
Profile Visibility: Limit profile visibility to connections only. Adjust settings to control who can see your connections and profile updates.
Sensitive Information: Avoid sharing details about current projects, clients, or internal company information.
Reff
- https://osintteam.blog/dosint-deceiving-osint-a994724af95f

9
wiki/Read Me.md Normal file
View File

@@ -0,0 +1,9 @@
# Wiki Was Change
Check on Wiki page [Jieyaboo Wiki](https://github.com/Jieyab89/OSINT-Cheat-sheet/wiki)
# Contrib
Guide : [How to contrib](https://github.com/Jieyab89/OSINT-Cheat-sheet/blob/main/contribution.md)
Jieyab will aded manual

View File

@@ -1,82 +0,0 @@
# What Mean Sock Puppets?
A fake account, but this account was created authentically with interactions, photo posts, account personality, date and time created as if this were a real account and without any of your personal data, your history, clues that reflect you. Sock puppets are fake accounts or alternative profiles used to conduct investigations anonymously
# What Is The Purpose?
OSINT investigators create sock puppets so they can access content on various sites, such as social media platforms, where content is only available with an account.
Sock puppets are also created to isolate OSINT research, ensuring a separation between the personal and work lives of OSINT investigators. It is essential to emphasize the importance of separating an OSINT investigator's real identity from their research accounts, otherwise known as practicing good Operational Security (OPSEC).
Some platforms, such as Facebook, may tell a target they are being investigated through friend recommendations. Further, suppose you use your personal accounts to conduct OSINT research; you may accidentally "like" a post on your target's profile or accidentally send a friend request.
Posing the following question may help you further understand why it matters that you create sock puppets before researching targets. If you were a police officer, would you conduct surveillance using your personal vehicle? Most of you would hopefully answer "no"; you would not do that. The question to ask yourself is why you would use a personal Facebook account to research your subject. It's similar because your vehicle links to your real identity, just as your social media accounts link back to your real identity.
1. To investigate others without revealing your true identity.
2. Make the investigation authentic (HUMANINT, MASINT, other. With someone)
3. Approach and know the target in real time and in detail
4. Monitoring your target
# The Benefits of Sock Puppets
It is recommended that OSINT investigators avoid using their personal social media accounts for research purposes to uphold their privacy and security and ensure the investigation's integrity. Keeping personal and work accounts separate when conducting research is crucial for gathering information discretely and anonymously for good OPSEC.
# How To Detect?
*Pro tips you can read the https://github.com/Jieyab89/OSINT-Cheat-sheet/blob/main/wiki/Facebook%20investiagtions.md
1. Be aware that some accounts are known to be sock puppets
2. Many sock puppet accounts are female because men are often more gullible
3. Be aware that some accounts are known to be sock puppets. Its crucial to maintain consistency and avoid activities that might raise suspicion.
4. Check the human error like blunders, inconsistent, not recognizing a place or information that has been included in detail
5. Check the media and post e.g photo, post, comment and other. Check the timestamp too
6. They do not have many friends or followers
7. They never want to call/video call
8. They avoid meeting up
9. Their stories do not add up
# Build Your Sock Puppets Account
1. Use a separate laptop dedicated to sock puppet activities.
2. Never use your real IP address always use a VPN.
3. Knowing your data information such as location, place, hobby and other about bio make sure you know the details of what you have written in your profile and bio, make sure it looks legit and authentic and you know exactly what you have written, make sure it is consistent and avoid blunders.
4. Get a burner phone to avoid using your personal number. You can buy sms activate or buy phone number has register on the sim card
5. Never log in from a phone, as it may sync your contacts and reveal your identity.
6. Avoid using any real-life information that could be traced back to you.
7. Maintence your account
8. Create personal branding like blog, site and other things to get reputation
9. Dont give any information about you sock account with your friend, husband or wife, any people
10. Make it your persona :D
11. Create conditions within your account, for example you are an anarchist, bully or you are a good person. Use your own way to create the condition, in Indonesian is (Cipta Kondisi)
# What Is Catfishing
Catfishing is a term used to describe brazen identity fraud. This behavior aims to lure someone into a romantic relationship. So that you don't get caught up in a romance full of falsehoods and it has many benefits, it is often used in dating apps or online dating
## Why is it called Catfishing?
The practice of catfishing online has been around for many years, simply because it is so easy to falsify your identity on the internet. The term “catfish” became popular after a documentary named Catfish was released in 2010. Afterward, MTV launched a TV series called “Catfish” in 2012.
## Why Do People Catfish?
People catfish for a number of reasons. Some do not involve malicious intent, while others directly seek to harm specific people. Some of the primary reasons behind catfishing include:
1. Insecurity: If a catfisher feels bad about who they are in real life, they may try to create an identity that conforms more closely to what they wish they could be. This often includes using photos of someone they feel is better-looking than them. They may also pretend to have a successful career to experience how it feels to be admired for their “accomplishments.” Catfishers who assume attractive identities may also be trying to garner a lot of “friends” and attention online to feel more popular.
2. Concealing their identity: There are several reasons why people want to conceal their identity online. When no one knows who you are, it is easier to troll people on discussion boards because of the lack of repercussions. Some people intend to cheat on their spouse or significant other and feel the best way to get away with it is to falsify their identity. In other instances, a person hides their identity to extort money from someone else. If the person figures out the scam, they cannot tell authorities who the attacker is because of the catfisher's false persona.
3. Mental illness: In some cases, people who suffer from depression or chronic anxiety may choose to get involved in catfishing. As they assume another persons identity, they gain the confidence they need to associate with others and live what they feel is a more “normal” online life. With a more attractive, successful, or gregarious identity, they get a self-esteem boost whenever they engage with others online.
4. Revenge: Some catfishers seek revenge on the person they are impersonating. They use the persons name and face and create an online identity. Then they say or do things online that make the person look bad—or even get involved in illegal activity in the targets name.
5. Experimenting with sexual preferences: Some catfishers use the practice to explore their sexual identities. They assume the sexual preference they are interested in online, using an identity different from their own. As they engage in social interactions under that identity, they get a sense of how it would feel to live that lifestyle full-time.
6. To harass their target: When someone has been trying to stalk, bother, or pursue someone online, the target often blocks the aggressor on one or more social media platforms. When this happens, the attacker may use catfishing to continue their pursuits. Even though the victim does not know who they are interacting with, the catfisher, once accepted as a friend or follower, is still able to see the targets posts and pictures. In this way, they can keep tabs on what they are doing, when, and with whom.
A common thread among many of the reasons why people catfish is an absence of self-confidence. When people are either personally dissatisfied with themselves or feel their real identity is not good enough to accomplish a certain objective, they may assume another “self” to feel better or attain the desired result.
In other cases, the catfisher lacks the self-confidence needed to express themselves openly, but under the guise of a false identity, they feel they can be who they want to be.
Reff:
- https://www.fortinet.com/resources/cyberglossary/catfishing
- https://www.sans.org/blog/what-are-sock-puppets-in-osint/

View File

@@ -1,17 +0,0 @@
# Where OSINT Data From?
- Law Enforcement Sources (Private Sources) or (Publication)
- Paid Sources
- Open Sources (Internet)
- Data Breach
- Social Engineering & HUMINT
- Social Media
- Data Broker
- News Portal
- Journalist and Documentarian
- Satellite Data
- Academic Sources
- Data Census
- Court filings and arrest records
- Data Survey
- IOC (Indicator of Compromise)

View File

@@ -1,9 +0,0 @@
# Who OSINT Used
- Ethical Hacking and Penetration Testing
- Journalist
- Identifying External Threats (CTI)
- Law Enforcer
- Goverment
- Company
- General

View File

@@ -1,114 +0,0 @@
# What are data brokers?
Data brokers are companies selling personal information about you. Data brokers collect information from various sources to build up a detailed picture of who you are and then sell it on.
# How do data brokers collect information?
Data broker sites obtain information about you in several ways, both on and offline, connecting the dots to build comprehensive consumer profiles:
Your web browsing history. Every time you use a search engine, a social media app, or other types of app, fill out an online quiz or enter a competition, or visit different websites, you're leaving an electronic trail. Data brokers use this to build up a picture of who you are. Web tracking installed on most websites collects information about your online activities. Data brokers use web scraping a small piece of software or script that extracts data from any website to gather that information.
Public sources. This includes birth certificates, marriage licenses, divorce records, voter registration information, court records, bankruptcy records, motor vehicle records, and census data.
Commercial sources. Your purchase history what youve bought, when you bought it, how much for, and whether you used a coupon or loyalty card.
Your consent. When you sign up for things like a stores loyalty program, you may have given your consent for your data to be shared without necessarily realizing it (unless you read the fine print).
# What information do data brokers collect?
Using these different sources, data brokers piece together a wealth of information about you. The types of information collected include:
1. Your name
2. Address (both current and previous addresses)
3. Date of birth
4. Gender
5. Marital status
6. Family status, including if you have children, how many and how old they are
7. Social Security number
8. Education levels
9. Assets
10. Occupation
11. Phone number
12. Email addresses
13. Buying habits what you buy, when you buy it, and how much for
14. Personal interests and hobbies
Potentially they may also know your income levels, some details of your health status, your political views, and any criminal records.
Data brokers aggregate this information to build up user segments for example, “new mothers”, “fitness enthusiasts”, and so on which they sell to other companies for commercial purposes. Some of the categories may seem harmless, but they become intrusive and potentially raise ethical questions when focusing on medical or personal circumstances (for example, “HIV sufferers”).
Despite the volume of information collected, data brokers dont always get it right. For example, you might be buying baby clothes for a friend or family member, and the data broker perceives you to be a parent as a result, even though you might not be. You might be buying medications for an elderly relative, which the data broker interprets as a reflection of your health status and so on.
# How is your data used?
Data brokers sell your data to other companies for various commercial purposes. These include:
Marketing and advertising. Businesses purchase data so they can tailor marketing messages, customer offers, and online advertising to you. During election campaigns, political parties may use data to target you with political messages.
Risk mitigation. Some businesses use the data they buy from data brokers to help crack down on fraud. For example, they may check that a consumer's information on a loan application matches the information that data brokers supply. Or the information might be used to calculate a consumers likelihood to default on a loan.
Health insurance. Information about your health what drugs you buy and what symptoms you search for online, for example can be used by health insurance companies to work out what rates you should be charged for cover based on your data profile.
People search sites. People search sites such as Spokeo, PeekYou, PeopleSmart, Pipl, and others allow you to search for a person by name and usually for a fee receive information about them, like their address, phone number, email address, date of birth and so on. The information which populates these sites comes from data brokers and can sometimes be used for doxing, social engineering, or identity theft.
# Are data brokers legal?
As ever, laws vary by jurisdiction, and the legal picture is not always clear-cut. Generally speaking, if data brokers use public records to obtain information, then their activities are legal, though there are gray areas.
In the EU, there is the General Data Protection Regulation (GDPR), which is a data privacy and security law that covers any organization which targets or collects consumer data in the European Union. This states that consumers must explicitly provide consent before their data can be collected. GDPR also gives consumers the right to ask that organizations delete data stored about them. Other countries have similar laws to this for example, the Brazilian equivalent is the LGPD (Lei Geral de Proteção de Dados).
In the US, the picture is more fragmented since there is no overarching federal equivalent to GDPR. Laws vary by state, with some states taking a closer interest in data broking than others. For example, Californias Consumer Privacy Act allows consumers to obtain copies of what information data brokers have compiled about them, request that the information be erased, and opt-out of having their data sold.
Often, the consent required to collect user data is buried in the fine print of most websites. So it's not always apparent to individuals how much control of their data they are giving up.
# Data brokers data breach examples
Aside from the ethical and legal issues raised by data brokerage, one area of concern is the scope for data breaches. Data brokers compile sensitive information that could have severe consequences for the individuals affected if it fell into the wrong hands.
Notable data broking security incidents include:
In 2017, Equifax announced a data breach that affected the personal information of 147 million people. The company later announced a settlement with the Federal Trade Commission and 50 states, which included up to $425 million to help compensate the individuals affected.
In 2015, 15 million records belonging to T-Mobile but stored on Experians servers were accessed.
In 2011, Epsilon was hacked, exposing the names and email addresses of millions of people on email marketing lists, who were then subject to spam as well as spear-phishing attempts.
In 2003, Acxiom was hacked, with over 1.6 billion records (including names, addresses, and email addresses) stolen and sold to spammers.
# How to protect yourself from data brokers
It isn't easy to stay off data broker lists entirely. Still, you can opt-out of data collection by contacting data broking sites individually to request they remove your details which is a time-consuming process. Alternatively, there are companies you can pay to do this for you. A better approach is to try to stay off data broker lists in the first place by taking steps to safeguard your privacy online.
# How to remove yourself from data collection sites
Privacy Rights Clearinghouse has a comprehensive data broker list here. This includes a link to their privacy policies and details on how you can opt-out from each broker. Opting out is unlikely to be a one-off process its something you probably need to revisit regularly to be effective. If youre a resident of the EU, this guide explains how you can send GDPR erasure requests, as well as further information on removing yourself from data collection sites.
A company called Brand Yourself scans for your data in the databases of major data brokers and gives you a report on where your data has been found. That will provide you with a starting point of which data brokers to remove yourself from.
To opt-out of these sites, you usually have to contact them via email. It's a good idea to create a new, throwaway, secondary email account to do this. This is to keep your primary email account safe and to protect it from spam.
If you are concerned with how a company is handling your personal data, you can file a complaint with the relevant government agency in your country. This will vary around the world for example, in the US, its the Federal Trade Commission, and in the UK, its the Information Commissioners Office.
# Pay private companies to keep you away from data brokers
Companies such as PrivacyDuck and DeleteMe are examples of companies that will help keep your data private. However, these companies charge a fee for their services.
Safeguard your privacy online by following the steps below
1. Familiarize yourself with the legal framework governing data privacy in your country or state to see what your rights are.
2. Avoid posting personal information on social media. For example, your date of birth is often used as an identifier or security question, so avoid posting it publicly.
3. Consider making your social media accounts private, so only friends and family can see them.
4. Avoid participating in online quizzes or entering online sweepstakes these often capture data about you.
5. Avoid downloading risky apps from untrustworthy sources and delete any unnecessary apps you dont use.
6. Keep the number of online accounts you have to a minimum only ones you really use.
7. Avoid opening unknown emails.
8. To curtail tracking, use a web browser that includes tracker-blocking and ad-blocking software.
You can also use a VPN or Virtual Private Network to enhance your online privacy. When you connect to the internet using a VPN, your IP address remains hidden, and your data is encrypted. Kaspersky VPN Secure Connection stops hackers from reading your data and provides online privacy.
# Defend your self
- [Enable Focus Iphone](https://support.apple.com/id-id/guide/iphone/iphd6288a67f/ios#:~:text=Membuat%20Fokus%20Khusus,-Jika%20Anda%20ingin&text=Buka%20Pengaturan%20%3E%20Fokus.&text=di%20kanan%20atas%2C%20lalu%20ketuk,Fokus%20Anda%2C%20lalu%20ketuk%20Return.)
- [Kuncitara Iphone](https://support.apple.com/id-id/guide/iphone/iph049680987/ios)
- [Nord VPN](https://nordvpn.com/id/offer/cyber-plan-page/?vpn=brand&gad_source=1)
# Data broker list
Here the list data broker you should know
- [OSINT data broker lists](https://github.com/Jieyab89/OSINT-Cheat-sheet/tree/main#osint-data-broker-list)
Reff :
- [kaspersky.com](https://usa.kaspersky.com/resource-center/preemptive-safety/how-to-stop-data-brokers-from-selling-your-personal-information)